How to Updgrade To DLO 7.5?
Note 1: For any existing customers with previous release of DLO (NetBackup DLO or BackupExec DLO) apart from the versions mentioned above, it will be a stepped upgrade support. That is, customers should first upgrade the existing version of DLO to Symantec DLO 7.0, and then upgrade to Symantec DLO 7.5 Upgrading to Symantec DLO 7.5 To upgrade from a previous version of DLO to Symantec DLO 7.5, follow these steps: 1 Run setup.exe to start the installation wizard. 2 Click Next. 3 Read the license agreement, and if you accept the terms, select I accept the terms in the license agreement. 4 Click Next. 5 As DLO 7.5 comes with Dedupe feature, the following screen appears. 6 Select the Install Dedupe Administration Service Feature check box and click Next. 7 During upgrade, the following screen may appear in some scenarios. 8 Select the Do not close applications option and click OK. Note: Reboot is not required after upgrade. 9 Proceed with the installation steps. 10 When the installation is completed, click Finish. Upgrading the DLO Database on Remote SQL Server If an existing installation is NetBackup 6.1 MP7, and if the DLO Database is installed on a remote SQL server, then follow this procedure to upgrade the DLO Database. 1 Before uninstalling the older version of DLO Database component on the database machine, ensure that the correct version of the new utility DLODBRegcreateU.exe (available in x86/x64 version) is executed. The DLODBRegcreateU.exe creates a registry key-value (string) HKLM\Software\Symantec\Symantec DLO\DB\OldDLODBPath Note: You must have administrator privileges to run the DLODBRegcreateU.exe utility. 2 Next, uninstall the existing DLO Administration Server and the DLO Database component. 3 Upgrade to Symantec DLO by using the Remote DLO Database Installation option, during installation. Note: If you have installed Symantec DLO 7.0 with remote database setup, then while upgrading to Symantec DLO 7.5, select the “Remote DLO Database Installation” option. Similarly, for BE-DLO 2010 R3 with the remote database setup, select the “Remote DLO Database Installation” option while migrating to Symantec DLO 7.5. Updating the Desktop Agent As soon as the DLO Administration Server is updated, either through a full install or Maintenance Pack release, the Desktop Agents should be updated in one of the following ways: 1 Update the Desktop Agent from the Desktop Agent Computer 2 Update the Desktop Agent using the Install Agents and Maintenance Services on Remote Computers option on the DLO Administration Console. 3 Update the Desktop Agent from the Command-Line Interface Note: Command line option does not work for Windows Vista and later. In this case, you can use either the first or second option Procedure to Push Install Desktop Agent and DLO Maintenance Server Note: To push install Desktop Agent on to a Windows 8 Agent machine, the remote registry services should be enabled and started on that machine. To push install Desktop Agent and push install DLO Maintenance Server on remote computers 1 Launch the DLO Administration Console. 2 On Tools, select Install Agents and maintenance services on remote computers and click Next. 3 On Install Agent/Maintenance Server to Remote Computers > Select Component to select any of the following components: ■ Agent - To push-install the Desktop Agent from the administration server to remote computers. ■ Maintenance - To push-install the DLO Maintenance Server from the administration server to remote computers. 4 Click Add. 5 In Manual Entry of Remote Computer Name, type the following: ■ Name/IP Address: Enter the computer name or IP address of the remote computer. ■ Domain Name: Enter the domain name of the remote computer. ■ Browse: Click Browse. In Select Computer, choose the required remote computer and click OK. The Name/IP Address and Domain Name is updated. Also, Remote Computer Logon Credentials is displayed with the selected computer name and domain name. 6 Click OK. 7 In Remote Computer Logon Credentials, type the following: ■ User Name: Enter the user name for an account that has administrator rights on the remote computer. ■ Password: Enter the password for an account that has administrator rights on the remote computer. ■ Domain Name: The domain name is displayed based on the domain name you have entered in Manual Entry of Remote Computer Name. ■ Use this user name and password when attempting to connect to additional computers during the installation: Select this option if you want to use the same user name and password during the next installation. By default, this option is not selected. 8 Repeat steps 4 to 6 for every remote computer for which you want to push-install the options. 9 You can also import the list of IP addresses of remote computers. To import the list, do the following: ■ On Install Agent/Maintenance Server to Remote Computers > Remote Computer Selection window, click Import Computers. On the Import Remote Computers window, click Import List. ■ Select the specific .txt file that contains all the IP addresses of remote computers. Note: To generate a .txt file that contains the list of Desktop Agent machines, run the DLOCommandu.exe -ListMachines command. For more information, see “-ListMachines command” on page 236. ■ To select a remote computer, click Browse. ■ Click Add List. The IP address or the computer name is displayed in the Computer panel. ■ Click the computer name or IP address and enter the details in these fields: ■ User Name: Enter the user name for an account that has the administrator rights on the remote computer. ■ Password: Enter the password for an account that has the administrator rights on the remote computer. ■ Domain Name: Enter the same domain name that you had entered in Manual Entry of Remote Computer Name. ■ Click OK. 10 Click Install. Based on the component (Desktop Agent or Maintenance Server) you have selected, the remote Desktop Agent or Maintenance Server is added. 11 To exit the wizard, click Finish. To remove the remote Desktop Agent or Maintenance Server from the list 1 Select the remote Desktop Agent or the Maintenance Server. 2 Click Remove. A Confirmation Window is displayed with the message: ‘Do you want to Delete: <Component>’. Note: <Component> refers to either Remote Desktop Agent or Maintenance Server, depending on the component you want to delete. 3 Click Yes. The component is deleted from the list. Also follow the DLO 7.5 Admin Guide http://www.symantec.com/business/support/index?page=content&id=DOC6413&key=61042It’s Time to Design Protection for the Future, Today
Organisations throughout EMEA often view backup and recovery as a necessity; they do not appear to support productivity, drive growth or increase profitability. This perception is understandable given the number of products in the marketplace that simply address backup and recovery alone. Narrow capabilities that do not even cater to all areas of the infrastructure have a tendency to worsen complexity and increase costs rather than the opposite outcome that IT teams strive for. This narrow set of capabilities is also detrimental to the wider IT infrastructure as businesses look to modernize infrastructure and make better use of their information. Industry analysts support the premise that three information challenges drive technology decisions[1]: Extending virtual and cloud Keeping pace with data growth Reducing cost and complexity The broad set of capabilities delivered in Backup Exec 15 brings value to business beyond recovery of information. Supporting and enabling the extension of IT infrastructure ever-further into the latest technology leverages the benefits that virtual and cloud infrastructures bring. Making use of this single touch point to manage the increasing volumes of data and the recovery demands imposed not only helps IT to make the best decisions but also to put more into productive, innovative activities. It’s Time for backup and recovery that drives your business. It’s Time for Backup Exec 15. Join the conversation #ItsTimeForBE15 Check back next Tuesday or subscribe for part 2 of 5 @barnabywood [1] ESG, Research Report: 2014 IT Spending Intentions Survey, February 2014 IDC, Unified Data Protection for Physical and Virtual Environments, January 2014It’s Time to Extend Your Virtual and Cloud Infrastructures
Well understood as drivers of change in IT departments throughout EMEA with an adoption rate for server virtualization of 79% and cloud adoption of 56%[1] these two continue to proliferate messages of cost benefits and simplification. Perhaps we consider cloud as ‘virtual that somebody else does for me’ and gain a better understanding of the nature of where information is stored. Whilst the adoption of public cloud storage for backup in EMEA remains well behind adoption of web hosting, email hosting, content filtering and productivity solutions it does demand a new level of flexibility in planning information protection for both the short and longer term futures. We find ourselves moving rapidly from static, largely on-premise, physical infrastructures that are designed and built to last for a number of years, to infrastructures which are specifically designed to account for and embrace change across a wide variety of platforms, technologies and delivery mechanisms: physical, virtual and cloud. IT infrastructure is no longer built to last, but built to change across a combination of virtual, physical and cloud. You can take confidence in Backup Exec 15’s breadth and depth of integrated capabilities and have the flexibility to make business-centric decisions for IT, safe in the knowledge that information is protected and recoverable whatever your platform or technology. It’s Time for backup and recovery that enables choice. It’s Time for Backup Exec 15. Join the conversation #ItsTimeForBE15 [1] Spiceworks “State of IT” Report, January 2015It’s Time to Reduce Cost and Complexity
Whilst company revenues are expected to increase throughout 2015, IT budgets are largely expected to remain at 2014 levels[1] driving the need for IT teams to deliver more to the business with the same, or less resource. The end of support life of Windows Server 2003 in July 2015 will be a driver for many organizations to review hardware and software estates; to look to new technologies in an effort to take account of flat or declining budgets. Although it often becomes an afterthought, backup and recovery can consume a significant portion of budget not in terms of product purchase necessarily but in terms of staff cost: skills required to manage complexity with so many facets to the infrastructure. Despite industry analyst recommendations[2], some organisations continue to make use of multiple products to protect the different platforms or technologies within their environment. Business productivity is driven by innovation not by underlying process. Backup Exec 15 can be purchased, maintained and renewed through a single, all-inclusive license meter that enables full functionality; deployed, managed and upgraded centrally. Combined with a robust architecture which maximises reliability Backup Exec 15 helps you spend less time ‘doing backup.’ It’s Time for backup and recovery that gives your time back. It’s Time for Backup Exec 15. Join the conversation #ItsTimeForBE15 [1] Spiceworks 2015 Budget Report [2] IDC, Unified Data Protection for Physical and Virtual Environments, January 2014It’s Time to Keep Pace with Data Growth
Over many years the increasing growth of data has been of significance to IT teams looking to access, manage and protect company information. That data now resides in a greater quantity of ever more disparate locations within or outside one geographical location. Estimates suggest that global data will reach 7.9 Zetabytes in 2015, up from 1.2 Zetabytes in 2010. Furthermore the same estimates forecast that number will have increased to around 40 Zetabytes by 2020.[1] Today over 60% of that data is unstructured and therefore in many cases, unmanaged and potentially difficult to protect and restore. Whilst many conversations circulate around big data and driving value from vast quantities of data, the day-to-day issue for most organisations is one of meeting and improving recovery point and recovery time objectives (RPO and RTO). Powerful, integrated technologies enable more frequent backups and rapid recovery across physical, virtual and cloud, different operating systems and applications. Ever-increasing volumes of data across a wide range of platforms and applications impact recovery objectives. Backup Exec 15 enables intelligent protection of information that brings recovery points closer and recovery times shorter, maximising available infrastructure resources. Backups take place more frequently, restore is completed as soon as it’s needed. Once captured that data is easily transitioned and repurposed in virtual infrastructure for test, development and analytics. It’s Time for backup and recovery that outperforms expectations. It’s Time for Backup Exec 15. Join the conversation #ItsTimeForBE15 [1] IDC, Digital Universe study, December 2012 IDC, Worldwide Disk-Based Data Protection and Recovery 2012-2016 Forecast, December 2012